‘Sometimes you just have to try something’ - A critical analysis of Danish state-led initiatives countering online radicalisation
Keywords:
Online Radicalisation, Countering Violent Extremism, CVE, Terrorism, Critical Terrorism StudiesAbstract
This research paper argues that Danish online radicalisation policies are driven by logics of urgency (the threat is imminent) within a limited realm of discursive possibilities (the threat is securitised) which blur the lines between state and civil society as well as state and private sector interactions. Potential political implications bring into play questions about the democratic values that are perceived as safeguarded by these policies. The Danish case shows that we (as citizens, policy makers and researchers) must engage in further discussions on dynamics between the current threat perception of online radicalisation and policies addressing such a threat. My argument is constructed from a discourse analysis of official documents as of 2016-2017 on countering and preventing violent extremism and an analysis of the political logics driving a state-level conceptualisation of online radicalisation through interviews with government officials. The two-part analysis is theoretically based on Securitisation from the Copenhagen School in combination with Critical Terrorism Studies to create a critically inspired approach that remains within existing structures of Danish politics. This is done to engage with the current political landscape characterised by a securitisation of specific forms of online content associated with the Islamic State as an Other. Online radicalisation is herein constructed as a multidimensional threat towards a societal Self referring to the physical safety of citizens and a value based ‘way of life’. The decentralised structure of the internet allows communication flows that enable radicalisation to be understood as an inter-sectoral threat where multiple elements of the referent object are threatened simultaneously. This threat perception challenges government officials in developing and implementing policies to address the threat of the Other while safeguarding the democratic values of the Danish Self.
References
Aistrope, T. (2016b) The Muslim paranoia narrative in counter-radicalisation policy. Critical Studies on Terrorism, 9:2. p. 182-204
Aradau, C. and T. Blanke (2016) Politics of prediction: Security and the time/space of governmentality in the age of big data. European Journal of Social Theory. p. 1-19
Ashour, O. (2011). Online De-Radicalization? Countering Violent Extremist Narratives: Message, Messenger and Media Strategy. Perspectives on Terrorism, 4(6). p. 15-19
Balzacq T., Guzzini S., Williams M. C., Wæver, O., and Patomäki, H. Forum: What kind of theory—if any—is securitization? p. 26-32
Bertelsen, P. (2015) “Danish Preventive Measures and De-radicalisation Strategies: The Aarhus Model” in Hofmeister, W. and M. Sarmah (editors). From the desert to world cities: The new terrorism. Panorama: Insights into Asian and European Affairs. Konrad-Adenauer-Stiftung Ltd. p. 241- 252
Blaikie, N. (2000) “Strategies for answering research questions” in Designing Social Research – The Logic for Anticipation, Polity Press, Cambridge. p. 85-119
Blakeley R. (2010) ‘State terrorism in the social sciences: theories, methods and concepts’ in Jackson, R., E. Murphy and S. Poyting, Contemporary State Terrorism - Theory and Practice. Routledge. p. 12-28
Bryman, A. and G. Burgess (2002) “Developments in qualitative data analysis” in Analyzing Qualitative Data, Routledge. p. 1-18
Buzan, B., O. Wæver and J. de Wilde (1998) Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner Publishers, p. 1-239
Byman, D. (2016) Understanding the Islamic State - A review essay. International Security, Volume 40, Number 4. p. 127-165
Christmann, K. (2012). Preventing Religious Radicalization and Violent Extremism. A Systematic Review of the Research Evidence. Youth Justice Board. p. 1-77
Collins, J. and R. Glover (2002) “Terrorism” in Collins, John and Ross Glover Collateral Language: A User’s Guide to America’s New War, New York University Press, p. 155-173
Crone, M. (2016). Radicalization revisited: violence, politics and the skills of the body. International Affairs, 92(3). p. 587–604
Dalgaard-Nielsen, A. (2010) Violent Radicalization in Europe: What We Know and What We Do Not Know, Studies in Conflict & Terrorism, 33:9, p. 797-814
Dalgaard-Nielsen, A. (2013) Promoting Exit from Violent Extremism: Themes and Approaches, Studies in Conflict & Terrorism, 36:2, p. 99-115
Dalgaard-Nielsen, A. (2016) Countering Violent Extremism with Governance Networks. Perspectives on Terrorism. Vol 10. Issue 6. p. 135-139
Davies, G., Neudecker, C., Ouellet, M., Bouchard, M., & Ducol, B. (2016). Toward a Framework Understanding of Online Programs for Countering Violent Extremism. JD Journal for De-radicalization, 6(Spring 2016). p. 51-86
Ditrych, O. (2014) “Concerning Method” and “Enclosure 2000s” In Tracing the Discourses of Terrorism: Identity, Genealogy and State. Springer. p. 76-94
Eroukhmanoff, C. (2015) “The remote securitization of Islam in the US post-9/11: euphemisation, metaphors and the “logic of expected consequences” in counter-radicalization discourse. Critical Studies on Terrorism, 8:2. p. 246-265
Friis, S. M. (2015) Beyond anything we have ever: beheading videos and the visibility of violence in the war against ISIS. International Affairs vol. 91, no. 4, p. 725-746
Geeraerts, S. B. (2012) Digital Radicalization of Youth, Social Cosmos 3(1) 2012, p: 25–32
Gibbs, Graham R. (2007) Analyzing Qualitative Data, Sage Research Methods. p. 38-49; 143-150
Greenberg, K.J. (2016) Counter-radicalisation via the internet. The ANNALS of the American Academy of Political and Social Science. Vol 668, Issue 1, p. 165 – 179
Greve, E. B. (2014) Politiets Efterretningstjeneste – en retlig belysning af tjenesten virksomhed og det samlede kontrolsystem. Jurist- og Økonomforbundet. p. 13-168
Hansen, L. (2006) Security as practice, The New International Relations Series, 1-255
Hansen, L. (2011) Theorizing the image for Security Studies: Visual securitization and the Muhammad Cartoon Crisis. European Journal of International Relations, vol. 17, no. 1, p. 51–74
Hansen, L. (2012) Reconstructing Desecuritization: The Normative-Political in the Copenhagen School and Directions for How to Apply It. Review of International Studies, vol. 38, no. 3, p. 525 –546
Hansen, L. and H. Nissenbaum (2009) Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53(4), p. 1155-1175
Hemmingsen, A.S and K. I. Castro (2017) The trouble with counter narratives. Danish Institute for International Studies, Report. February 2017. p. 1-48
Horgan, J. and Braddock, K. (2010). Rehabilitating the Terrorists? Challenges in Assessing
the Effectiveness of De-radicalisation Programs. Terrorism and Political Violence, 22(2),
p. 267-291
Jackson, R. (2009) Critical Terrorism Studies: An Explanation, a Defence and a Way Forward Paper prepared for the BISA Annual Conference, 14-16 December 2009, University of Leicester, UK. p. 1-25
Jackson, R., Murphy, E. and S. Poyting (2010) ‘Introduction: terrorism, the state and the study of political terror’ in Contemporary State Terrorism - Theory and Practice. Routledge. p. 1-12
Jackson, R. Smyth, M., Gunning J. and L. Jarvis (2011) ‘Conceptualizing Terrorism ’in Terrorism: A Critical Introduction, Palgrave Macmillan, p. 99-124
Jackson, R. (2015) The Epistemological Crisis of Counterterrorism. Critical Studies on Terrorism 8 (1). p. 33–54
Jungherr, A. (2014) The Logic of Political Coverage on Twitter: Temporal Dynamics and Content. Journal of Communication 64.2. p. 239-259
Klausen, J. (2015) Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq, Studies in Conflict and Terrorism 38(1), 2015, p: 1–22
Koehler, D. (2014). The Radical Online: Individual Radicalization Processes and the Role
of the Internet. Journal for Deradicalization, Winter (2014/15), p. 116-134
Lakomy, M. (2017) Cracks in the Online Caliphate: How the Islamic State is Losing Ground in the Battle for Cyberspace. Perspectives on Terrorism. Vol 11, No 3. p. 40-54
Leech, B. L and F. R. Baumgartner, J. M. Berry, M. Hojnacki and D. C. Kimball (2013) “Putting it all together. Lessons from the ‘Lobbying and Policy Change’ Project in L. Mosley, Interview Research in Political Science. Cornell University Press. New York. p. 209-225
Lindekilde, L. (2015) Danish prevention of extremism and radicalization 2009:2014: developing trends and future challenges. Politica, 47. vol. nr. 3. p. 424-444
Lorrand Bodo, M.A. and Speckhart, A. (2017) The Daily Harvester: How ISIS Disseminates Propaganda over the Internet Despite Counter-Measures and How to Fight Back. The International Center for the Study of Violent Extremism. p. 1-5
MacLean, L. M. (2013) The Power of the Interviewer in L. Mosley, Interview Research in Political Science. Cornell University Press. p. 67-84
Mavelli, L. (2013) Between Normalisation and Exception: The Securitisation of Islam and the Construction of the Secular Subject. Millennium. Journal of International Studies 41(2) p. 159–181
Maxwell, J. (2002) ‘Understanding and Validity in Qualitative Research’ in Huberman, A. M. and M. B. Miles. The Qualitative Researcher's Companion. Sage Publications. p. 36-61
Mosley, L. (2013) Introduction. “Just talk to people”? Interviews in Contemporary Political Science” in L. Mosley, Interview Research in Political Science. Cornell University Press. New York. p. 1-31
Muro, D. (2016) What does Radicalisation look like? Four visualizations of socialization into Violent Extremism. Barcelone Centre for International Affairs, p. 1-5
Nissenbaum, H. (2005) Where computer security meets national security. Ethics and Information Technology 7. Springer. p. 61–73
Radu, R. (2014) “Power Technology and Powerful Technologies: Global Governmentality and Security in the Cyberspace” in J.F. Kremer and B. Müller, Cyberspace and International Relations - Theory, Prospects and Challenges. Springer Heidelberg New York Dordrecht London. p. 3-21
Ramsay, G. (2015) Why terrorism can, but should not be defined, Critical Studies on Terrorism, 8:2. p. 211-228
Richards, A. (2015) From terrorism to ‘radicalization’ to ‘extremism’: counterterrorism imperative or loss of focus? International Affairs 91: 2. p. 371–380
Romaniuk, P. (2015) Does CVE Work? Lessons Learned From the Global Effort to Counter Violent Extremism. Global Center on Cooperative Security, September issue. p. 1-50
Rubin, H. J. and I. S. Rubin (2005) Qualitative Interviewing: The Art of Hearing Data. Second Edition. Thousand Oaks: London: Sage Publications. 19- 38; 64-78; 108-128; 129-150; 151-172; 201-223
Schofield, J.W. (2002) ‘Increasing the Generalizability of Qualitative Research’ in Huberman, A. M. and M. B. Miles. The Qualitative Researcher's Companion. Sage Publications. p. 171-202
Sheikh, J. (2016) “I Just Said It. The State”: Examining the Motivations for Danish Foreign Fighting in Syria. Perspectives on Terrorism. Vol 10, issue 6. p. 59-67
Sjöstedt, R. (2017) Securitization Theory and Foreign Policy Analysis, Politics. Oxford Research Encyclopedias, April 2017, p. 1-18
Stephens, A. C. and N. Vaughan-Williams (2010) Terrorism and the Politics of Response. Routledge. p. 1-17; 60-79
Thorup, M. (2010) An Intellectual History of Terror - War, violence and the state. Routledge. p. 1-58
Torok, R., ‘Developing an Explanatory Model for the Process of Online Radicalisation and Terrorism’, Security Informatics 2(6), 2013, p. 1–10
Urqhart, C. (2013) Grounded Theory for Qualitative Research: A Practical Guide, London. Sage Publications. p. 78-105; 106-126
Walker, C., and Conway, M. (2015) Online Terrorism and Online Laws, Dynamics of Asymmetric Conflict 8(2), p. 156–175
Williams, M.C. (2014) ‘Securitization as politica theory: The politics of the extraordinary. in Balzacq T., Guzzini S., Williams M. C., Wæver, O., and Patomäki, H. Forum: What kind of theory—if any—is securitization? P 19- 25
Wæver, O. (2014). ‘The Theory Act: Responsibility and Exactitude as seen from Securitization’. in
Interviews conducted in the spring and summer of 2017:
The Danish Foreign Ministry – April 28, 2017 (43 min)
The Danish Ministry of Justice – April 24, 2017 (48 min)
The Danish Ministry of Justice Research department – May 6, 2017 (Skype interview 24 min)
The National Centre for Prevention (NCP) – May 25, 2017 (Skype interview: 51 min)
The Ministry of Immigration and Integration – June 28, 2017 (Written interview)
The Municipality of Copenhagen – May 3, 2017 (Skype interview 28 min)
Researcher on Central Intelligence Services (CIS) – May 11, 2017 (Skype interview: 38 min)
Classified contact within the Danish Foreign Ministry – May 1, 2017 (55 min)
Websites:
Gemmerli, T. (2014) “Radicalisation: a battle between politics and science” in Udenrigs. Tema: Radikalisering. The Danish Foreign Policy Society. p. 4-15 (online). Available at:
http://udenrigs.dk/wp-content/uploads/2015/03/Udenrigs_3_2014_Web.pdf Published December 2014, Read on November 7, 2017
Gemmerli, T. (2016) Avoid the pitfalls of counter-narratives. Danish Institute for International Studies. Policy Brief. p. 1-4 (online). Available at: http://pure.diis.dk/ws/files/633658/Undg_modnarrativernes_faldgruber_til_webben.pdf Published in September 2016, Read on November 1, 2017
Gemmerli, T. and J. Teglskov Jacobsen (2014) Censorship on social media is not a good idea, Danish Institute for International Studies, Policy Impact. p. 1-2 (online). Available at: http://pure.diis.dk/ws/files/79796/Censur_er_en_d_rlig_ide_IMPACT_forweb.pdf Published in November 2014, Read on November 17, 2017
Gjerding, A. and L. Skou Andersen (2016) Denmark purchase surveillance system from NSA supplier, Information. p. 1-5 (online). Available at
https://www.information.dk/indland/2016/10/danmark-koeber-overvaagningssystem-millioner-nsa-leverandoer Published on October 28, 2016, Read on November 14, 2017
Lafree, G. (2017) 6 reasons why stopping worldwide terrorism is so challenging. The Conversation – Academic rigour, journalistic flair p. 1-5 (online). Available at
https://theconversation.com/6-reasons-why-stopping-worldwide-terrorism-is-so-challenging-70626 Published May 22, 2017, Read on November 13, 2017
Meleagrou-Hitchens, A and N. Kaderbhai (2017). Research Perspectives on Online Radicalisation: A Literature Review 2006-2016. Kings College London. p. 1-74 (online). Available at http://icsr.info/wp-content/uploads/2017/05/ResearchPerspectivesonOnlineRadicalisation.pdf Published April 30, 2017, Read on November 15, 2017
Municipality of Copenhagen (2016) Efforts by the municipality of Copenhagen to prevent radicalisation. Municipality of Copenhagen. p. 1-47 (online). Available at: https://www.kk.dk/sites/default/files/edoc/e893f1d0-8b2d-4cc2-867d- 5378ee177bd3/21df14fa-4608-4639-8b79-6aadd9e09525/Attachments/15361379- 18737342-1.PDF
Published May 2016
Read on November 2, 2017
Parliament (2017) Referatet af Folketingets forhandlinger: 1. behandling af lovforslag nr. L 171: Forslag til lov om ændring af lov om politiets virksomhed og toldloven. (Politiets anvendelse af databaserede analyseredskaber og adgang til oplysninger om flypassagerer). Meeting number 85. The first reading of the bill. p. 1-10 (online). Available at http://www.ft.dk/samling/20161/lovforslag/L171/BEH1-85/forhandling.htm#dok Published on April 25, 2017, Read on November 14, 2017
SUS – Social Development Centre (2017) Hackathons for young people (online). Available at: https://www.sus.dk/cases/hackhadet-hackathons-for-unge/
Published in September 2017, Read on November 29, 2017
Talbot, D. (2015, September 30). Fighting ISIS Online. MIT Technology Review. p. 1-10
(online). Available at: https://www.technologyreview.com/s/541801/fighting-isis-online/
Published on September 30, 2017, Read on November 10, 2017
The Danish Foreign Ministry (2016) Redegørelse af indsatsen imod terrorisme. Maj 2016.
p. 1-19 (online). Available at http://um.dk/~/media/UM/Danish-site/Documents/Udenrigspolitik/Nyheder_udenrigspolitik/2016/Redegrelse%20-%20Indsatsen%20mod%20terrorisme%202016.pdf?la=da Published on May 2016 Read on November 21, 2017
The Danish Ministry of Justice (2016) Regeringen opruster I kampen mod parallelsamfund p. 1-3 (online). Available at http://justitsministeriet.dk/nyt-og-presse/pressemeddelelser/2016/regeringen-opruster-i-kampen-mod-parallelsamfund
Published on October 11, 2016
Read on November 11, 2017
The Danish Ministry of Justice (2017) Forslag til Lov om ændring af lov om politiets virksomhed og toldloven (Politiets anvendelse af databaserede analyseredskaber og adgang til oplysninger om flypassagerer) (L171) p 1-8 (online) Available at
https://www.retsinformation.dk/forms/R0710.aspx?id=188277
Published on March 29, 2017
Read on November 8, 2017
The Danish National Action Plan (2016) Countering and Preventing Violent Extremism. p. 1-36. (online). Available at
Published on October 2016
Read on November 12, 2017
Von Behr, I., Reding, A., Edwards, C., and Gribbon, L. (2013) Radicalisation in the digital era. The use of the internet in 15 cases of terrorism and extremism. Brussels: RAND Europe. p. 1-76 (online). Available at http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf
Published July 2013
Read on November 11, 2017
Winter, C. and J. Bach-Lombardo (2016) Why ISIS propaganda works and why stopping it requires that government get out of the way. The Atlantic. p. 1-8 (online). Available at https://www.theatlantic.com/international/archive/2016/02/isis-propagandawar/462702/
Published on February 13, 2016
Read on June 08, 2017
Downloads
Published
Issue
Section
License
The JD Journal for Deradicalization uses a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND) Licence. You are free to share - copy and redistribute the material in any medium or format under the following conditions:
Attribution — You must give appropriate credit, provide a link to the license, andindicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.